Skip to main content
Log in

Applying NFC for automated replication of user data

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The results of analyzing the mechanisms and channels for replicating user data have been given. The replication mechanisms have been classified. Their advantages and drawbacks have been found. A method has been proposed that uses NFC to establish the secure data replication channel.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Padgette, J., Scarfone, K., and Chen, L., Guide to Bluetooth Security. http://csrc.nist.gov/publications/drafts/800-121r1/Draft-SP800-121_Rev1.pdf.

  2. Kilani, R., and Jensen, K., Mobile Authentication with NFC enabled Smartphones. http://ojs.statsbiblioteket.dk/index.php/ece/article/download/21229/18718.

  3. Diffie, W. and Hellman, M.E., New directions in cryptography. https://www-ee.stanford.edu/~hellman/publications/24.pdf.

  4. Host Card Emulation. https://developer.android.com/guide/topics/connectivity/nfc/hce.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. V. Ivanov.

Additional information

Original Russian Text © D.V. Ivanov, D.A. Moskvin, A.V. Myasnikov, A.F. Suprun, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ivanov, D.V., Moskvin, D.A., Myasnikov, A.V. et al. Applying NFC for automated replication of user data. Aut. Control Comp. Sci. 51, 855–859 (2017). https://doi.org/10.3103/S0146411617080090

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080090

Keywords

Navigation